north supports our public and private sector clients to understand the why and how of existing security operations and management. We support the more advanced, innovative and technology-orientated methods — resulting in secure and positive changes in people, process and capability.
tailored security: we show you how
Who we are
northisCanberra’sleadingAustralianownedCyberSecuritycompany.
What we do
How we do it
north has a high performing team of skilled consultants and technology experts experienced in providing end to end security services to Australian Government.
Our people are experts across all aspects of cyber security and digital consulting with experience in bridging business and technology to achieve outcomes in challenging ICT environments.
Learn More
Case Studies
PROTECTED Cloud Uplift Roadmap
Our client is a large Federal Government agency with a national footprint who is trusted to safeguard information regarding the majority of Australians. As the agency evolves and migrates their technology to the cloud, they need a plan to ensure their cloud architecture is ready for the storage and processing of PROTECTED classified information.
Achieving the Essential 8
Our client employs more than 3,500 staff across 29 locations with significant national critical infrastructure. The client required assistance in achievement of Australian Signals Directorate (ASD) Essential 8 across their complex ICT environment.
Security Architecture
Our client employs more than 3,500 staff across 29 locations with significant national critical infrastructure. Given the complex nature of the client’s systems, they required the development of a security architecture which took into account the ICT environments, as well as Australian Government Information Security Manual (ISM) and the Protective Security Policy Framework (PSPF) considerations.
Security Accreditation Documentation
A major Australian Government Department required assistance in developing security documentation to support their systems security accreditation function, as outlined in the Australian Government Information Security Manual (ISM).
Penetration Testing
north provides penetration testing services for a large Australian government client. The client operates a complex ICT environment with a large annual ICT budget.
IRAP Services
Our Australian Government Agency client required an Information Security Registered Assessors Program (IRAP) assessment of their Amazon Web Services (AWS) gateway to gain assurance of the operation of security controls around connectivity of their cloud compute environment.
Looking to improve your security and digital operations? Speak to our team and we’ll show you how.